lacework-global-272
6.5 Ensure That Cloud SQL Database Instances Do Not Implicitly Whitelist All Public IP Addresses (Automated)
Profile Applicability
• Level 1
Description
Database Server should accept connections only from trusted Network(s)/IP(s) and restrict access from public IP addresses.
Rationale
To minimize attack surface on a Database server instance, only trusted/known and required IP(s) should be white-listed to connect to it.
An authorized network should not have IPs/networks configured to 0.0.0.0/0 which will allow access to the instance from anywhere in the world. Note that authorized networks apply only to instances with public IPs.
Impact
The Cloud SQL database instance would not be available to public IP addresses.
Audit
From Console:
- Go to the Cloud SQL Instances page in the Google Cloud Console by visiting https://console.cloud.google.com/sql/instances.
- Click the instance name to open its
Instance detailspage. - Under the
Configurationsection clickEdit configurations - Under
Configuration optionsexpand theConnectivitysection. - Ensure that no authorized network is configured to allow
0.0.0.0/0.
From Command Line:
- Get detailed configuration for every Cloud SQL database instance.
gcloud sql instances list --format=json
Ensure that the section settings: ipConfiguration : authorizedNetworks does not have any parameter value containing 0.0.0.0/0.
Remediation
From Console:
Go to the Cloud SQL Instances page in the Google Cloud Console by visiting https://console.cloud.google.com/sql/instances.
Click the instance name to open its
Instance detailspage.Under the
Configurationsection clickEdit configurationsUnder
Configuration optionsexpand theConnectivitysection.Click the
deleteicon for the authorized network0.0.0.0/0.Click
Saveto update the instance.
From Command Line:
Update the authorized network list by dropping off any addresses.
gcloud sql instances patch <INSTANCE_NAME> --authorized-networks=IP_ADDR1,IP_ADDR2...
Prevention:
To prevent new SQL instances from being configured to accept incoming connections from any IP addresses, set up a Restrict Authorized Networks on Cloud SQL instances Organization Policy at: https://console.cloud.google.com/iam-admin/orgpolicies/sql-restrictAuthorizedNetworks.
References
https://cloud.google.com/sql/docs/mysql/configure-ip
https://console.cloud.google.com/iam-admin/orgpolicies/sql-restrictAuthorizedNetworks
https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints
https://cloud.google.com/sql/docs/mysql/connection-org-policy
Additional Information
There is no IPv6 configuration found for Google cloud SQL server services.